Please turn on your JavaScript for this page to function normally.
Microsoft logo
New, improved Microsoft 365 security and compliance features

Microsoft has announced a number of enhancements to help its business and enterprises customers improve security and compliance efforts. Among these is a new solution for …

organize
Defining risk controls that actually work

Previously, we looked at practical ideas for conducting the complex information security risk assessments that all enterprises should regularly perform. The right methodology …

mountain connect
IoT is an ecosystem, as secure as its weakest link

Remember when, three years ago, several Mirai botnets hit DNS provider Dyn and caused part of the Internet to be unreachable for most users in North America and Europe? For a …

industry
How can security teams effectively monitor OT and ICS networks?

Modern industrial operations are complex and dynamic environments that have unique security challenges. Andrew Ginter, VP Industrial Security at Waterfall Security Solutions, …

users
A continuous problem: Tackling the cybersecurity skills shortage

We have read the over abundance of apocalyptic articles covering the growing talent shortage in cybersecurity. But buried under the hyperbolic numbers, there is a larger and …

hands
People are the very first element in a pragmatic cybersecurity strategy

39 percent of cybersecurity and IT executives indicate their company is under-prepared to handle a data breach and 66 percent prefer negotiating with a used car salesperson …

biohazard
Keeping up with the evolving ransomware security landscape

Cybercrime is ever-evolving, and is consistently becoming more effective and damaging. While the range of attack vectors available to malicious actors are vast, ransomware …

money
Security services and network security still top spending priorities for CISOs in MENA

Middle East and North Africa (MENA) enterprise information security and risk management spending will total $1.7 billion in 2020, an increase of 10.7% from 2019, according to …

patch
Want to overcome patching challenges once and for all? Automation is the key

The cybersecurity threatscape in the UK is extremely complex and sophisticated. It is no longer a question of whether a cyberattack will occur, but when; according to a recent …

shark
Is the enterprise on the brink of a global web supply chain attack?

Ever since the Web development ecosystem evolved to the current paradigm of code reuse, companies have placed themselves too close to the abyss. Web supply chain attacks are a …

library
Exploring the benefits of cybersecurity certification

In this interview, Tony Vizza, Director of Cybersecurity Advocacy APAC, (ISC)2, talks about the benefits of earning a cybersecurity certification, the most common …

fire
DevOps firewall: How pre-configuring your cloud deployment can ensure compliance

Following the recent massive Capital One data breach, it’s clear that even some of the world’s largest and most respected companies working in the cloud are still vulnerable …

Don't miss

Cybersecurity news